ceph 16.2.10+ds-1 source package in Debian

Changelog

ceph (16.2.10+ds-1) unstable; urgency=high

  * New upstream hotfix release:
    - CVE-2022-0670: Users who were running OpenStack Manila to export native
      CephFS, who upgraded their Ceph cluster from Nautilus (or earlier) to a
      later major version, were vulnerable to an attack by malicious users
      (Closes: #1016069).
    - A regression made it possible to dereference a null pointer for for
      s3website requests that don’t refer to a bucket resulting in an RGW
      segfault.
  * Add fix-FTBFS-include-memory.h.patch to address FTBFS under GCC 12.

 -- Thomas Goirand <email address hidden>  Wed, 27 Jul 2022 09:30:47 +0200

Upload details

Uploaded by:
Ceph Packaging Team
Uploaded to:
Sid
Original maintainer:
Ceph Packaging Team
Architectures:
any all
Section:
admin
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
ceph_16.2.10+ds-1.dsc 8.0 KiB 08af6897f9d540ba2dbd535ccfe3c5967742b5e45fdb411de08d2b588b9b2f46
ceph_16.2.10+ds.orig.tar.xz 103.6 MiB d7edf185fbfbc87d98c8a1a374588eb025d9abe29a349fb50988ca62974030b1
ceph_16.2.10+ds-1.debian.tar.xz 115.1 KiB 6d4263b6491044b0e6ec060378827179e87cf3508c015787d5b6a224521068f2

No changes file available.

Binary packages built by this source